The following protocols should be used if :A suspicious a suspicious package or letter is received, or
A a threat via telephone is received regarding a bomb and/or a bio-chemical or chemical sourceor any other device
Reviewed by | Date |
---|---|
Incident Support Team | 10/7/2015 |